Skip to content

Commit a6563a3

Browse files
committed
Explicit note on Java deserialization
(cherry picked from commit 76964e1)
1 parent 0589c1b commit a6563a3

File tree

2 files changed

+12
-2
lines changed

2 files changed

+12
-2
lines changed

spring-web/src/main/java/org/springframework/remoting/httpinvoker/HttpInvokerProxyFactoryBean.java

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright 2002-2012 the original author or authors.
2+
* Copyright 2002-2016 the original author or authors.
33
*
44
* Licensed under the Apache License, Version 2.0 (the "License");
55
* you may not use this file except in compliance with the License.
@@ -36,6 +36,11 @@
3636
* expense of being tied to Java. Nevertheless, it is as easy to set up as
3737
* Hessian and Burlap, which is its main advantage compared to RMI.
3838
*
39+
* <p><b>WARNING: Be aware of vulnerabilities due to unsafe Java deserialization:
40+
* Manipulated input streams could lead to unwanted code execution on the server
41+
* during the deserialization step. As a consequence, do not expose HTTP invoker
42+
* endpoints to untrusted clients but rather just between your own services.</b>
43+
*
3944
* @author Juergen Hoeller
4045
* @since 1.1
4146
* @see #setServiceInterface

spring-web/src/main/java/org/springframework/remoting/httpinvoker/HttpInvokerServiceExporter.java

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/*
2-
* Copyright 2002-2012 the original author or authors.
2+
* Copyright 2002-2016 the original author or authors.
33
*
44
* Licensed under the Apache License, Version 2.0 (the "License");
55
* you may not use this file except in compliance with the License.
@@ -47,6 +47,11 @@
4747
* expense of being tied to Java. Nevertheless, it is as easy to set up as
4848
* Hessian and Burlap, which is its main advantage compared to RMI.
4949
*
50+
* <p><b>WARNING: Be aware of vulnerabilities due to unsafe Java deserialization:
51+
* Manipulated input streams could lead to unwanted code execution on the server
52+
* during the deserialization step. As a consequence, do not expose HTTP invoker
53+
* endpoints to untrusted clients but rather just between your own services.</b>
54+
*
5055
* @author Juergen Hoeller
5156
* @since 1.1
5257
* @see HttpInvokerClientInterceptor

0 commit comments

Comments
 (0)